Microsoft Wsearch Privilege Escalation

Discussion in 'News Aggregator' started by Packet Storm, 31 Oct 2016.

  1. Packet Storm

    Packet Storm Guest

    This post-exploitation Metasploit module requires a meterpreter session to be able to upload/inject our SearchIndexer.exe into WSearch (windows search) service. The WSearch service uses one executable.exe set in binary_path_name and runs it has local/system at startup, this enables local privilege_escalation/persistence_backdooring. To exploit this vulnerability a local attacker needs to inject/replace the executable file into the binary_path_name of the service. Rebooting the system or restarting the service will run the malicious executable with elevated privileges.

    Continue reading...
     

Share This Page

Loading...